You may reprint or publish this article free of charge as long as bylines are included.Original URL (The Web version of article) --------------------------------------------- http://www.defendingthenet.com/NewsLetters/YAWNA–YetAnother WirelessNetworking
Article.htm
Title ----- YAWNA - Yet Another Wireless Networking Article Wireless Network Security ------------------------------------------------------ The consumer-level wireless networking market has exploded over past few years. Unfortunately, manufacturers have been lax in explaining potential security risks associated with their products. Typical instructions bundled with consumer products are geared towards getting you up and running as quickly as possible. Only recently has consumer equipment begun shipping with basic security measures enabled. Unfortunately, this effort is flawed by fact that all devices typically ship with same default configurations, making effort wasted.
Do People Really Care About Wireless Security -------------------------- While there are hundreds, if not thousands, of articles currently available on how to secure a wireless home network, they frequently address only steps involved, ignoring reasoning behind them. Of course most obvious reason is to protect data on your own network. Believe it or not, many people don’t see this as enough incentive. One of my own family members (who has an IT background, no less) once expressed to me that security of his network wasn’t of concern because he knew his individual machines were safe. He was right with regards to his systems; they were pretty secure. However, his belief that someone intruding on his network was there for his stuff was flawed.
Using Your Wireless Network For Fun & Profit ----------------------------------- Your bandwidth alone is a significant motivator for less than scrupulous. Your unsecured wireless network can provide ultimate “anonymizer” for illicit activities. You may be facilitating a glorious “hacker” techno-battle, such as those portrayed in movies and television. Perhaps an international spy needs to transmit secret data back to her superiors and decides to borrow your network to fulfill task. While not likely, you never know. Little Johnny Wants A New Toy ---------------------------------------------- Here’s a more realistic scenario:
Little Johnny has a stolen credit card number. We don’t know how he got it, it doesn’t really matter. What does matter is that Johnny now wants to take advantage of his prize and knows exactly how. His reward will be one of those new handheld video games that are flying off shelves. Johnny isn’t foolish enough to walk into a store and use his stolen credit card, he knows a better way. Johnny lives across street from you and your unsecured wireless network